Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends (IJCOT)          
 
© 2013 by IJCOT Journal
Volume-3 Issue-2                          
Year of Publication : 2013
Authors :  Ambarisha Malladi , M. Chandra Naik, Sayyed Nagul Meera

Citation

  Ambarisha Malladi , M. Chandra Naik, Sayyed Nagul Meera   " Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium . "International Journal of Computer & organization Trends  (IJCOT), V3(2):32-39 Mar - Apr 2013, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract

In this paper, we address the problem of jamming under an internal threat model. We discuss about Swift jamming attacks in wireless networks, presenting a challenger model for selective jamming attacks, which may give to the high importance for packet Delivery Techniques in which specific messages of “high importance” are targeted. Further, we illustrate the impact of selective jamming on the network performance by illustrating various selective attacks against the TCP protocol. We show that such attacks can be launched by performing real-time packet classification at the physical layer. We examined the combination of cryptographic primitives with physical layer attributes for preventing real-time packet classification and neutralizing the inside knowledge of the attacker. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. We develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. Here we propose the Packet delivery techniques on Jamming Attacks over a wire less medium. In this paper we use hiding mechanisms and cryptographic techniques based on the Riddles.

References

[1].Alejandro Proa˜no and Loukas Lazos- Packet-Hiding Methods for Preventing Selective Jamming Attacks.
[2]. G. Noubir and G. Lin. Low-power DoS attacks in data wireless LANs and bad guys. In DIMACS Workshop on Mobile and Wireless Security, 2004.
[3]. www.techterms.com/definition/wireless
[4]. http://www.geocaching.com/seek/cache_details.aspx?guid=395a56a3-61b4-4c29-b413-69374d4c2565
[5]. Y.Wang, G. Attebury, and B. Ramamurthy. A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2):2–23, 2006.
[6]. J. Douceur. The sybil attack. In 1st International Workshop on Peer-to-Peer Systems - IPTPS,2002.
[7]. Andrew S. Tanembaum. Redes de computadores. Elsevier, Rio de Janeiro, 4ž edition edition,2003.
[8]. www.spamlaws.com/jamming-attacks.html
[9]. www.cambridge.org/us/catalogue/
[10]. Gustavo S. Quirino, Admilson R. L. Ribeiro and Edward David Moreno- Asymmetric Encryption in WirelessSensor Networks

Keywords

Jamming Attacks, Wireless Networks Elements, Crypto–logic Riddles, Enhanced Packet Delivery Techniques, wi-fi, Blue Tooth.